7.8
CVSSv2

CVE-2019-18336

Published: 10/03/2020 Updated: 29/09/2020
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

A vulnerability has been identified in SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions < V3.X.17), SIMATIC TDC CP51M1 (All versions < V1.1.8), SIMATIC TDC CPU555 (All versions < V1.1.1), SINUMERIK 840D sl (All versions < V4.8.6), SINUMERIK 840D sl (All versions < V4.94). Specially crafted packets sent to port 102/tcp (Profinet) could cause the affected device to go into defect mode. A restart is required in order to recover the system. Successful exploitation requires an malicious user to have network access to port 102/tcp, with no authentication. No user interation is required. At the time of advisory publication no public exploitation of this security vulnerability was known.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

siemens simatic s7-300 cpu firmware

siemens simatic s7-300 cpu 312 ifm firmware

siemens simatic s7-300 cpu 313 firmware

siemens simatic s7-300 cpu 314 firmware

siemens simatic s7-300 cpu 314 ifm firmware

siemens simatic s7-300 cpu 315 firmware

siemens simatic s7-300 cpu 315-2 dp firmware

siemens simatic s7-300 cpu 316-2 dp firmware

siemens simatic s7-300 cpu 318-2 firmware

siemens sinumerik 840d sl

siemens simatic tdc cp51m1 firmware

siemens simatic tdc cpu555 firmware